Skip to main content
. 2020 Oct 9;20(20):5729. doi: 10.3390/s20205729
BS Base Station
CBS Cloud-Based Services
CIA Confidentiality, Integrity, Availability
CoT Cloud of Things
CRA Code Reuse Attack
CRO Configurable Ring Oscillator
CRP Challenge Response Pair
DoS Denial of Service
DDoS Distributed Denial of Service
FaaS Fog as a Service
FCG Fog Computing Gateway
HSM Hardware Security Module
IaaS Infrastructure as a Service
IDS Intrusion Detection System
IoT Internet of Things
IIoT Industrial Internet of Things
ISA Instruction Set Architecture
ITS Intelligent Transportation Systems
LBS Location-Based Services
MEC Mobile Edge Computing
PaaS Platform as a Service
PACS Picture Archiving and Communication System
PII Personally Identifiable Information
PUF Physically Unclonable Functions
QoS Quality of Service
RE Reverse Engineering
RISC Reduced Instruction Set Computer
SaaS Software as a Service
SoC System on a Chip
TaaS Things as a Service
TRM Tamper Resistant Memory
VM Virtual Machine